Scientists have told how to hack a smartphone through the speaker

© Photo : androidfan.piperazina system Android. Archive photoScientists have told how to hack a smartphone through the speaker© Photo : androidfan.hypotesis to daily updates RIA Science

Thank you for subscribing

Please check your e-mail to confirm your subscription

A group of scientists from the Lancaster University in the UK was able to steal a pattern of a smartphone using only his microphone and a speaker. Their study is published in the electronic library ArXiv.org.

The Android smartphones used three systems owner identification: fingerprint, password numerical and graphic key. There are about 400 thousand ways to connect all the dots on the screen of the device, and 20% of people use only twelve of the most common ones. Scientists have invented a special program SonarSnoop, which allows the user almost certainly find a graphical password of gadget another person, being at a distance from it.

For this operation, the application was installed on two smartphones. Immediately after installation SonarSnoop automatically gets the right to manage the speaker and microphone and connect both devices. The program then causes a speaker to produce sound at a frequency inaccessible to man, and analyzes data dynamics, collecting reflected from the surrounding objects and sound.

As the creators say, the program is able to analyze small changes in speaker position that occurs when a person touches the screen with your finger. Is the nature of these oscillations it is possible to set the position of your finger on the screen and the direction it is moving. The alleged code is displayed on the second device. For demonstration, the researchers used a Samsung Galaxy S4. After the test program it is possible to reject 70% of the options key.

The authors say that IOS can be hacked too in a similar way, but their study is carried out only with smartphones on Android.

Option hacking, such SonarSnoop, called the break-through third-party channels, which are not software vulnerabilities, and the physical limitations of the device. Hacking the device with sound is called acoustic cryptanalysis. With it earlier was impossible to read the text printed on the printer or keyboard, and perform computer work at the sound of a fan or ultrasound produced by his motherboard. SonarSnoop — the first example of this type of hacking mobile devices.

Source